2024-07-01 00:23:09,683:DEBUG:certbot._internal.main:certbot version: 1.6.0
2024-07-01 00:23:09,683:DEBUG:certbot._internal.main:Arguments: []
2024-07-01 00:23:09,683:DEBUG:certbot._internal.main:Discovered plugins: PluginsRegistry(PluginEntryPoint#manual,PluginEntryPoint#null,PluginEntryPoint#standalone,PluginEntryPoint#webroot)
2024-07-01 00:23:10,522:DEBUG:certbot._internal.log:Root logging level set at 20
2024-07-01 00:23:10,523:INFO:certbot._internal.log:Saving debug log to C:\Certbot\log\letsencrypt.log
2024-07-01 00:23:10,559:DEBUG:certbot._internal.plugins.selection:Requested authenticator <certbot._internal.cli.cli_utils._Default object at 0x04D31E90> and installer <certbot._internal.cli.cli_utils._Default object at 0x04D31E90>
2024-07-01 00:23:10,604:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:23:10,632:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:23:10,649:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is signed by the certificate's issuer.
2024-07-01 00:23:10,654:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai-image.daisuke-design.pl\cert10.pem is: OCSPCertStatus.GOOD
2024-07-01 00:23:10,662:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:12 UTC.
2024-07-01 00:23:10,662:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:23:10,663:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:23:10,668:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290>
Prep: True
2024-07-01 00:23:10,669:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290> and installer None
2024-07-01 00:23:10,669:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:23:10,675:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:23:10,676:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:23:10,679:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:23:11,170:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:23:11,170:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:08 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "vuYIE_RKp8k": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-01 00:23:11,171:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:23:16,366:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8079_key-certbot.pem
2024-07-01 00:23:21,056:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8077_csr-certbot.pem
2024-07-01 00:23:21,057:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:23:21,057:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:23:21,213:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:23:21,213:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:18 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6CkVbbJsEe2q33-xvrA3izusAH27iS3wI1deADVFvX9lxc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:23:21,214:DEBUG:acme.client:Storing nonce: qqMiT6CkVbbJsEe2q33-xvrA3izusAH27iS3wI1deADVFvX9lxc
2024-07-01 00:23:21,214:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai-image.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:23:21,221:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tWYmJKc0VlMnEzMy14dnJBM2l6dXNBSDI3aVMzd0kxZGVBRFZGdlg5bHhjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "a6VBSbCKbeouRAGmaWhOu3slxmabPNvupbJbR8OIh5g4JO1WYZlrGug5aAZnXOWjSYHY9mXwJrqbdIS-_35BVOLAEQUBQloUwSw2u9FnsV8-YN8cTZMHpPJwzkCIAJ8l8_uSxTGv-OnruVIDtxYueAsFatxPwFmO_zr8xFd9fn3tT_nI8twhAQM47D7axteFky7ty2b1u7TUjkMqzMa2XXG_xIn1wavZfWfU8aTgGia8G-CmnfjmqOKCPwY4xwKKkYeFPmTQdZiOos9ck3OmoLaDHmsmqaKpOfcvziTY0zNo0zpj22cLBgCEO06VO8QGFUuWox34gVu9iMHcRBQ5Dg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLWltYWdlLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-01 00:23:21,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-07-01 00:23:21,395:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:23:18 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824128037
Replay-Nonce: qqMiT6CkKIddoG_OUqAYiZnrwgy1xbgY-JxC3RiFNTQ3YLG5iXs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:00:50Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai-image.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824128037"
}
2024-07-01 00:23:21,395:DEBUG:acme.client:Storing nonce: qqMiT6CkKIddoG_OUqAYiZnrwgy1xbgY-JxC3RiFNTQ3YLG5iXs
2024-07-01 00:23:21,396:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:23:21,403:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985446737:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tLSWRkb0dfT1VxQVlpWm5yd2d5MXhiZ1ktSnhDM1JpRk5UUTNZTEc1aVhzIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU0NDY3MzcifQ",
  "signature": "x_Dw7TztMcRRdmQUesfMwwZRI9gVzeMYqbzbePU5xymTU3rvl1G_7oJ7sWAGyLNX14icAtikFeO07KWPGZSjDqC_ebQ3pB-Gg2j4OJfxDPUKCDSNRMdM_SkpTZW9t5sQ4MRoy2rnG6rksUuWK9WU4q6RhMgxxB_-CMoT7E-P53B3oa4wD6LicOPFqGJfO-wy8RiOT6ecVqyTH7VPtaddbuVl5nBSuyZuWiSD9oqhL3R0hbCVcX5pzb9Qh8nv5N7epMUpORljMFsIm3xPnGWWHRPtOt5M0wcsRdSmzjhBf6hyd-HBgGOI1bVlEB5GUii3kLgBIBuy9CDPyfaaIw7xJQ",
  "payload": ""
}
2024-07-01 00:23:21,564:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985446737 HTTP/1.1" 200 810
2024-07-01 00:23:21,565:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:19 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0OkMx-qtLBVD6GK8QHamURLXuE-zr9J05vPwVaASYnbY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai-image.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:00:50Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/KAQe7Q",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Sd6_7w",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985446737/Ra3-nA",
      "status": "pending",
      "token": "dwUlTvV0LjeJd_L7RDeoy20JvJ_tkycbJvSk_7GvWSQ"
    }
  ]
}
2024-07-01 00:23:21,565:DEBUG:acme.client:Storing nonce: jqVAJFJ0OkMx-qtLBVD6GK8QHamURLXuE-zr9J05vPwVaASYnbY
2024-07-01 00:23:21,565:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:23:21,566:INFO:certbot._internal.auth_handler:http-01 challenge for ai-image.daisuke-design.pl
2024-07-01 00:23:21,566:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:23:21,567:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:23:21,581:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:21,581:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:23:21,582:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:23:21,582:WARNING:certbot._internal.renewal:Attempting to renew cert (ai-image.daisuke-design.pl) from C:\Certbot\renewal\ai-image.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:23:21,588:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:21,631:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:23:21,676:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:23:21,677:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-01 00:23:21,678:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\ai.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-01 00:23:21,683:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:26 UTC.
2024-07-01 00:23:21,683:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:23:21,684:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:23:21,688:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290>
Prep: True
2024-07-01 00:23:21,688:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D31290> and installer None
2024-07-01 00:23:21,689:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:23:21,694:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:23:21,695:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:23:21,697:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:23:22,152:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:23:22,153:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:19 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "tDn0t893RGw": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-01 00:23:22,154:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:23:26,717:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8080_key-certbot.pem
2024-07-01 00:23:31,161:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8078_csr-certbot.pem
2024-07-01 00:23:31,162:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:23:31,162:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:23:31,315:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:23:31,315:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:28 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLCG0q6wmAwlCPN-U2J0z3b5mekACyZw6Sl5Ejerh61T14
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:23:31,315:DEBUG:acme.client:Storing nonce: B-hK_YLCG0q6wmAwlCPN-U2J0z3b5mekACyZw6Sl5Ejerh61T14
2024-07-01 00:23:31,316:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "ai.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:23:31,322:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENHMHE2d21Bd2xDUE4tVTJKMHozYjVtZWtBQ3ladzZTbDVFamVyaDYxVDE0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "dLB_J-_MVrEAJbJMy5L34eetQgIepAZ3L5OVuz3sOlyF8e0gXg_uteZqGnjaS3kTdfvMUU9sKsDwmMh2nyvuYzuPxv40hs3UKMFJbVeez1wdmSpxWZJ0WbB4yemgvaM_yIfuS_Hn0fC5RoiK8rF77a8mQzObhL2ubheP4Zi1M4I-5pvIiO3s-5eLd145nZmm_kcWo8lWtC7O4FbnIiElYg5nNigZLsp3KMyxXX-K9M-qDPziKoRDfqDg4KoBall7NV2FrcPmRvqfZC2ETCu814xjQFvEaeL5u3qesgFfqabsROeqbI1-MkTrstMruXbDQy6rYWo7IX625mmiaSbW2w",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFpLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-01 00:23:31,487:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 344
2024-07-01 00:23:31,488:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:23:29 GMT
Content-Type: application/json
Content-Length: 344
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824165847
Replay-Nonce: B-hK_YLCn5ImLnNgRIFmzHHJUMiCuRkLzKfXS_GKaXnfyPG1o80
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "ai.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824165847"
}
2024-07-01 00:23:31,488:DEBUG:acme.client:Storing nonce: B-hK_YLCn5ImLnNgRIFmzHHJUMiCuRkLzKfXS_GKaXnfyPG1o80
2024-07-01 00:23:31,488:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:23:31,494:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985503087:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENuNUltTG5OZ1JJRm16SEhKVU1pQ3VSa0x6S2ZYU19HS2FYbmZ5UEcxbzgwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1MDMwODcifQ",
  "signature": "JUtMZEDlPYaCENhfU0_7VqZc5FcQVKv0ogFvQOEvEzPmRDorxTD2o-w2EqBNeLgDfNFBEUr1M5q60a3jNcohwxYzd2cIe8Y6gksEuSeUEmrFJMrzquxjsfllq-XgPwWUiXNkYM7HEzhY9Bara4jWFFMsVNmhhHf__53Lo2RD8abgJlJI_RHBBdcNBNHN3gjMsYMJkLRvEcFFDITzC9fTWYKVGBeQp_t-0x_7fJ8EM7YuQlwQ2hcpZzpVJ-sia-N_7NmOI63hj6nwIfdmyjiFEQnUw1NIeWGaa2Ju2wU8NHTL1c-v2NM5ID97yzjVoua_7JKWmSKPNPDWz_FV89PVCQ",
  "payload": ""
}
2024-07-01 00:23:31,650:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985503087 HTTP/1.1" 200 804
2024-07-01 00:23:31,651:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:29 GMT
Content-Type: application/json
Content-Length: 804
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9TcFrSmkpfNs436MWXPsfxBoX9KTTHZS_oRxFvbeM-14
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "ai.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/6TW65g",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/HbqBvA",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985503087/f36r8w",
      "status": "pending",
      "token": "fh7IXezABaQM8zDDAGvQdvfd2ljqZ4DqrgWltkilPrQ"
    }
  ]
}
2024-07-01 00:23:31,651:DEBUG:acme.client:Storing nonce: eF-2qMJ9TcFrSmkpfNs436MWXPsfxBoX9KTTHZS_oRxFvbeM-14
2024-07-01 00:23:31,651:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:23:31,652:INFO:certbot._internal.auth_handler:http-01 challenge for ai.daisuke-design.pl
2024-07-01 00:23:31,652:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:23:31,652:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:23:31,653:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:31,653:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:23:31,653:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:23:31,654:WARNING:certbot._internal.renewal:Attempting to renew cert (ai.daisuke-design.pl) from C:\Certbot\renewal\ai.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:23:31,655:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:31,710:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:23:31,918:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:23:31,920:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-01 00:23:31,920:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\aslan.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-01 00:23:31,925:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:40 UTC.
2024-07-01 00:23:31,926:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:23:31,926:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:23:31,931:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0476FA70>
Prep: True
2024-07-01 00:23:31,932:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0476FA70> and installer None
2024-07-01 00:23:31,932:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:23:31,937:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:23:31,937:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:23:31,940:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:23:32,373:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:23:32,373:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:29 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "m-TiETDW_Qk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:23:32,374:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:23:37,068:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8081_key-certbot.pem
2024-07-01 00:23:41,525:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8079_csr-certbot.pem
2024-07-01 00:23:41,526:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:23:41,526:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:23:41,673:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:23:41,673:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:39 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9DzesE-4H90Txb08F2srkHTvHjxhBwDCd8udpk7nxrtA
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:23:41,673:DEBUG:acme.client:Storing nonce: eF-2qMJ9DzesE-4H90Txb08F2srkHTvHjxhBwDCd8udpk7nxrtA
2024-07-01 00:23:41,674:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "aslan.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:23:41,680:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlEemVzRS00SDkwVHhiMDhGMnNya0hUdkhqeGhCd0RDZDh1ZHBrN254cnRBIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "aYkxaqzbCHjZRgaifgL4vrYKYY-6nsNvZMm74C0L9A8yG_A_BATg5-ypBRdD0pEJQx4VuFoSRDPds8UEjlkcnJhBDQ1fFGgkp9L49KwHmqVtfY2LdNl5oCttv4XrkqNelfI_IDYRshuTvWfVMoTPCHxnWaXYUe_vKQ_JIrH9dOAKDZZfzm91-UlyYBdzT9BkRAWaidG68llasc4AzvmH85vM83ugfVMgqms89n_npcxtw8vuqsuk0oyNbmp0m3Xc_xH53TIUhkqzzY-bc8vEMV3A-X_RctlJL2tUKpW4KcY2Ot8keVLnRzqGaoPvbh1ZjZmBXJT6Qtf4Vk7z4J8vnw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImFzbGFuLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-01 00:23:41,844:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 347
2024-07-01 00:23:41,844:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:23:39 GMT
Content-Type: application/json
Content-Length: 347
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824216467
Replay-Nonce: B-hK_YLCfRUpy4i_T8RbsxppmIIfLoHot1aYWz0xZBUG8mbopJY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:11Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "aslan.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824216467"
}
2024-07-01 00:23:41,845:DEBUG:acme.client:Storing nonce: B-hK_YLCfRUpy4i_T8RbsxppmIIfLoHot1aYWz0xZBUG8mbopJY
2024-07-01 00:23:41,845:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:23:41,851:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985574177:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENmUlVweTRpX1Q4UmJzeHBwbUlJZkxvSG90MWFZV3oweFpCVUc4bWJvcEpZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU1NzQxNzcifQ",
  "signature": "ZGI1vLFPXJDbyprqCAxb8LSURVyOXFlaeu1jqBjF-0GY-ayYQdOcEqxIDxoen1ViJcnC0QbOy0LOlRU0PBiJfFwMeCMWt-lvun41-Azuvup5bpika_41ibZrwmcrgQCgwjqp951i3jAQ9O_gk1mPejVkh_WSsTVJ3T-0vHVCMm39F8xqCOQM4F4Z0owSlMmljbmy9TG9K7rWRsufe3pGxUJUXuptEezFdHBVcrDEBrQYgA0i_ExxB-0EAKBG1PrvCnIhikh0k04uR53bdOE_42bYTzZqWUovTsnSS9PBHaszmJ-gRlgUsibMrzmPDvQxv_jrtzHu_jFPfPCxkiGHuw",
  "payload": ""
}
2024-07-01 00:23:42,015:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985574177 HTTP/1.1" 200 807
2024-07-01 00:23:42,016:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:39 GMT
Content-Type: application/json
Content-Length: 807
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9AC14dOLYy-BeVp6nhWWrGi39LJV5qik_KKYcKYFwtqY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "aslan.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:11Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/RO51fg",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/APGIHQ",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985574177/4l4xCQ",
      "status": "pending",
      "token": "QzfW1GXgiMrvk7eukyCp99viige8gVtmUv1UbvomoEs"
    }
  ]
}
2024-07-01 00:23:42,016:DEBUG:acme.client:Storing nonce: eF-2qMJ9AC14dOLYy-BeVp6nhWWrGi39LJV5qik_KKYcKYFwtqY
2024-07-01 00:23:42,017:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:23:42,017:INFO:certbot._internal.auth_handler:http-01 challenge for aslan.daisuke-design.pl
2024-07-01 00:23:42,018:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:23:42,018:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:23:42,019:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:42,019:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:23:42,019:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:23:42,019:WARNING:certbot._internal.renewal:Attempting to renew cert (aslan.daisuke-design.pl) from C:\Certbot\renewal\aslan.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:23:42,021:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:42,074:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:23:42,268:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:23:42,269:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-01 00:23:42,270:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-01 00:23:42,275:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:47:54 UTC.
2024-07-01 00:23:42,275:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:23:42,276:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:23:42,283:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D310B0>
Prep: True
2024-07-01 00:23:42,283:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D310B0> and installer None
2024-07-01 00:23:42,283:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:23:42,289:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:23:42,290:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:23:42,292:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:23:42,780:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:23:42,780:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:40 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "umWjZYHWfEs": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-01 00:23:42,781:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:23:47,590:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8082_key-certbot.pem
2024-07-01 00:23:52,221:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8080_csr-certbot.pem
2024-07-01 00:23:52,221:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:23:52,221:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:23:52,384:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:23:52,385:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:49 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ08BMyE-AG27GT1vDfhIKaoichvE9yHvjL7yHuVyorfRQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:23:52,385:DEBUG:acme.client:Storing nonce: jqVAJFJ08BMyE-AG27GT1vDfhIKaoichvE9yHvjL7yHuVyorfRQ
2024-07-01 00:23:52,386:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:23:52,392:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjA4Qk15RS1BRzI3R1QxdkRmaElLYW9pY2h2RTl5SHZqTDd5SHVWeW9yZlJRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "gDl5e7U-SZetY1cD9MgYMiKz5KyQkHjzV88hJVHwL2GPeqPYQ5yaTEKD3J_ISjBb0FzjqplTrkpQmK_yHz1f7wKQmn_BEpDZvoUEu8rLhtMsK7ELzznGa8ijKXlNIhjaWvrJZsXkPbiXWK-85_nDOXF7rNhKwmM-ZXID7b0c7hyynswuiwxaFB-8cxILvxC4oSj5eZnlc5F7Qp0tjWs9W0Z-jQeo3WJkCj4qffzz2ja_84pC9wlV3CvRvjrxpatas0UX0GyJW2zlq3ywNnkAk72xfkkp1Aie9v7bE0kooxsXwPKyQ28SUzsni9JkIClZbSAQFD032jIQkcpz84rxNg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-01 00:23:52,637:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 341
2024-07-01 00:23:52,638:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:23:50 GMT
Content-Type: application/json
Content-Length: 341
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824261497
Replay-Nonce: qqMiT6CkEoj19cFeBeTtCiMYxDXXVUZRTdGoHo2tvS0yf3Sbaf4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:21Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824261497"
}
2024-07-01 00:23:52,638:DEBUG:acme.client:Storing nonce: qqMiT6CkEoj19cFeBeTtCiMYxDXXVUZRTdGoHo2tvS0yf3Sbaf4
2024-07-01 00:23:52,638:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:23:52,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985640857:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tFb2oxOWNGZUJlVHRDaU1ZeERYWFZVWlJUZEdvSG8ydHZTMHlmM1NiYWY0IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2NDA4NTcifQ",
  "signature": "i22_vD0FG3RqFCGxdP6myxOQgYs3WvPQLeE0hm5t6-YSllhw05ROOELl5do3tmDquZOmc01_qLZfaKCseIqOaQMiFqOuQlH7DFYJNZud3o9z4X-Gcg_-81jB-_cqjVzv9-34uBvrSnMavxM0KmTOEnqDJiUvDhAOgb3eRzDB-6UHfzn_6t2LOO2KmTET4cMmpD2sA8N5ZSwigvkQOC8M8gT3zplQg8d8M4CZq1ZD_QOm-JVtt0HECQZ_HbXrmjZhjmRrkLc3HrO02Ed68Tcp-LTiBoCeUklf7xkFv60bwETaqjJmyvvyb39Ez5L4mp7Oz_NAHB8ec12XfnENhkWpVg",
  "payload": ""
}
2024-07-01 00:23:52,813:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985640857 HTTP/1.1" 200 801
2024-07-01 00:23:52,813:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:50 GMT
Content-Type: application/json
Content-Length: 801
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6CkEaO0kjoEHxUIPiJhTBqRt6ZmGGOPf2nCT7zqqsLmWdk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:21Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/_W_uNw",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/1XcAQA",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985640857/a1s51Q",
      "status": "pending",
      "token": "vLgEqGV_Y2Dzs37cZFwH5YZfeEC_vBv8_jOJGsyGIXs"
    }
  ]
}
2024-07-01 00:23:52,814:DEBUG:acme.client:Storing nonce: qqMiT6CkEaO0kjoEHxUIPiJhTBqRt6ZmGGOPf2nCT7zqqsLmWdk
2024-07-01 00:23:52,814:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:23:52,815:INFO:certbot._internal.auth_handler:http-01 challenge for daisuke-design.pl
2024-07-01 00:23:52,815:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:23:52,815:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:23:52,816:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:52,816:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:23:52,817:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:23:52,817:WARNING:certbot._internal.renewal:Attempting to renew cert (daisuke-design.pl) from C:\Certbot\renewal\daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:23:52,818:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:23:52,870:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:23:52,910:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:23:52,912:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-01 00:23:52,913:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\fsp.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-01 00:23:52,918:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:09 UTC.
2024-07-01 00:23:52,919:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:23:52,919:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:23:52,925:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390>
Prep: True
2024-07-01 00:23:52,925:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390> and installer None
2024-07-01 00:23:52,925:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:23:52,930:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:23:52,931:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:23:52,932:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:23:53,414:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:23:53,414:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:23:50 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "8fobBLp1oyc": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:23:53,415:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:23:57,989:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8083_key-certbot.pem
2024-07-01 00:24:02,473:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8081_csr-certbot.pem
2024-07-01 00:24:02,474:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:24:02,474:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:24:02,636:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:24:02,637:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:00 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0-brmLiWjSPMexK__WOnaYvUw4q4j5kK9jpEVnxgdsP0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:24:02,637:DEBUG:acme.client:Storing nonce: jqVAJFJ0-brmLiWjSPMexK__WOnaYvUw4q4j5kK9jpEVnxgdsP0
2024-07-01 00:24:02,637:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "fsp.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:24:02,645:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjAtYnJtTGlXalNQTWV4S19fV09uYVl2VXc0cTRqNWtLOWpwRVZueGdkc1AwIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "fQMh6ggjK7ONGNCuLB1xk9MAm1i669tw3LTOUzPZSD6Vkn6n7AiBMn0wndwq659ga2yKN65dbt5-RjKPOoszAHzf-_KLX5saZZbsrN7TDGX9B3BTv4C4UqmUxGL6-sgZMLXcYHOzl6YCd4F5DdC9umKIgM8AHVfVr2ovdD5y7HF9c_VEi8jnaczO-60mDtR764SmCyiuT8h63rWo9__ehpNkG_c50jghRvcookOCEtP_kwXeCGKtI_TmK52arhPRZyn1tndJQXMEKYDSZC55cbEsBBh2YdG_DU_jfkyXP9gBl6GFvQRo3nUaACCWW5ruJt543IH-BYjkLmUYxiw6rA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImZzcC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-01 00:24:02,821:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-01 00:24:02,822:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:24:00 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824300277
Replay-Nonce: jqVAJFJ0tdyHni8YQQnElVGIkX0UhQuoNsxt5_V-nj-2w0FqkAc
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:31Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "fsp.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824300277"
}
2024-07-01 00:24:02,822:DEBUG:acme.client:Storing nonce: jqVAJFJ0tdyHni8YQQnElVGIkX0UhQuoNsxt5_V-nj-2w0FqkAc
2024-07-01 00:24:02,823:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:24:02,829:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985696127:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjB0ZHlIbmk4WVFRbkVsVkdJa1gwVWhRdW9Oc3h0NV9WLW5qLTJ3MEZxa0FjIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU2OTYxMjcifQ",
  "signature": "lppkwY03BhQjazLplj_ilSAGFocYQHPmDlBzaVUTqm_6rKZMgoZci4dcdh5jpcsh7kre1usEPYoD_aI637voEA0vd5uheIAxIBtdT_PZHud9Mfx_E2uXgCrU62kPeSF7a4SClcss1Z1T8AEszC8GPWhRPZJljri2PQWARqom5-wYDLsfo4-2G_RRdf_sN1BRDiRbV7iXbFzZGZ9X9UmBTCoX8N1TfGhFhPi0IQUEkbYJzxrbce0rb1fWJqwyMNKuxxhY_YeN6J88snyVCqnCtHvER3cFH_dxfgZlLDXz5LJWTonj4vUe8KXRhZLiUa93-8yzDY61iTCrpNSCwBTAgA",
  "payload": ""
}
2024-07-01 00:24:02,995:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985696127 HTTP/1.1" 200 805
2024-07-01 00:24:02,995:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:00 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6CkqBGBI-sM8dqKndu9zEqmWBd-KLHmMl_wNwCqgIE8gi0
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "fsp.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:31Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/p3DiTg",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/dn4kZw",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985696127/A2Vu8Q",
      "status": "pending",
      "token": "PshktR_dWNaEu4Zlk5HzTZk084ND2kByigZS5fd8SiU"
    }
  ]
}
2024-07-01 00:24:02,995:DEBUG:acme.client:Storing nonce: qqMiT6CkqBGBI-sM8dqKndu9zEqmWBd-KLHmMl_wNwCqgIE8gi0
2024-07-01 00:24:02,996:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:24:02,996:INFO:certbot._internal.auth_handler:http-01 challenge for fsp.daisuke-design.pl
2024-07-01 00:24:02,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:24:02,997:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:24:02,998:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:02,998:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:24:02,998:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:24:02,999:WARNING:certbot._internal.renewal:Attempting to renew cert (fsp.daisuke-design.pl) from C:\Certbot\renewal\fsp.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:24:03,000:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:03,050:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:24:03,253:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:24:03,254:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-01 00:24:03,255:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\galeria.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-01 00:24:03,260:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:26 UTC.
2024-07-01 00:24:03,260:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:24:03,260:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:24:03,265:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390>
Prep: True
2024-07-01 00:24:03,266:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D03390> and installer None
2024-07-01 00:24:03,266:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:24:03,271:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:24:03,271:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:24:03,274:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:24:03,719:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:24:03,720:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:01 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "kTPjHD1Z4-I": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:24:03,721:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:24:08,238:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8084_key-certbot.pem
2024-07-01 00:24:12,719:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8082_csr-certbot.pem
2024-07-01 00:24:12,719:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:24:12,719:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:24:12,869:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:24:12,870:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:10 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9FQOGa3PYGllNpdsrO8Iaz8WvUhKadljSzOs3esQpGBM
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:24:12,870:DEBUG:acme.client:Storing nonce: eF-2qMJ9FQOGa3PYGllNpdsrO8Iaz8WvUhKadljSzOs3esQpGBM
2024-07-01 00:24:12,870:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "galeria.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:24:12,877:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlGUU9HYTNQWUdsbE5wZHNyTzhJYXo4V3ZVaEthZGxqU3pPczNlc1FwR0JNIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "NQFCwr0ildMIxkOMH1b3yeN8acm-9JvrqIoLhwYmJL7PLE7qmSziLRdmRZP7MlhasrrShQ8u3M7lNTPfR26whIF9eB1Q0wcPqWzZE-dILE9clmGci0aTZ-54JDXjj4AEATMwdh_6zEqHbvf2OuUUYSEZE1pnyvykiYZOMXawx91Pxih57tuqqlEY7YZvYrF1ZqacWNdIrnVyNiHy9-bNa29kDY2VahKs4z9nvCYYr0TytCfLIDIbbUxxNLQzunnAmLzWtSyzLE38M6Gy9owXbADIfesj4lcPGFJAp-Ff_AKXe9O6IWWHfTeTjg_008CIq6cXI6R74pyJuDsdmdOa2g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImdhbGVyaWEuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-01 00:24:13,045:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-07-01 00:24:13,046:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:24:10 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824334367
Replay-Nonce: B-hK_YLC1v9iJybCO0_E0VyZb35dYQaRW0nMAfXFdC1SvirOr_w
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:41Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "galeria.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824334367"
}
2024-07-01 00:24:13,046:DEBUG:acme.client:Storing nonce: B-hK_YLC1v9iJybCO0_E0VyZb35dYQaRW0nMAfXFdC1SvirOr_w
2024-07-01 00:24:13,046:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:24:13,054:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985747117:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTEMxdjlpSnliQ08wX0UwVnlaYjM1ZFlRYVJXMG5NQWZYRmRDMVN2aXJPcl93IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU3NDcxMTcifQ",
  "signature": "OgoBtacNvBxhKPXW1hMrfostIsgW_sfkat9daapQjouCCnIv_H4T7ZI3hWVs3qNZW43R7NsXVI0s-L4hsTr_j6mkZdBGoSWbk4GX1lmvGYV3Dd56I4vEPWCYZkmfk8ZHG0TXCXcf8I8CBtNEb7SZW5KWst9KC1_91v-K-dwKabj-MZs9x9PArEoy97Df2E6WtObxQObBXPfUaCgQ_l5-qhTm-DABJ5lLhEA8a5OCu0-NIJOxYLSgGVxUJtSYOOfyRFyz0g293QthH-LBUddrba0oG1QbR-Q5EdwMllF0c2bHzL1hkhkabZYe4oi9liEUYAxGnu-72bmVa8bhGqkBWA",
  "payload": ""
}
2024-07-01 00:24:13,222:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985747117 HTTP/1.1" 200 809
2024-07-01 00:24:13,222:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:10 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9cL4WeQkC9BcjsP6QlHRWOPlJXsKfwmTFMRsVM5plTU4
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "galeria.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:41Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/NIFDhg",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/1iYgbg",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985747117/elhV3g",
      "status": "pending",
      "token": "3dEAh4kVFseKKQEgf7k9_QWDLljqS3s0uBkbckT3iOY"
    }
  ]
}
2024-07-01 00:24:13,223:DEBUG:acme.client:Storing nonce: eF-2qMJ9cL4WeQkC9BcjsP6QlHRWOPlJXsKfwmTFMRsVM5plTU4
2024-07-01 00:24:13,223:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:24:13,224:INFO:certbot._internal.auth_handler:http-01 challenge for galeria.daisuke-design.pl
2024-07-01 00:24:13,224:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:24:13,224:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:24:13,225:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:13,225:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:24:13,225:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:24:13,226:WARNING:certbot._internal.renewal:Attempting to renew cert (galeria.daisuke-design.pl) from C:\Certbot\renewal\galeria.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:24:13,227:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:13,276:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:24:13,291:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:24:13,293:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is signed by the certificate's issuer.
2024-07-01 00:24:13,294:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\helix.daisuke-design.pl\cert1.pem is: OCSPCertStatus.GOOD
2024-07-01 00:24:13,298:INFO:certbot._internal.renewal:Cert not yet due for renewal
2024-07-01 00:24:13,302:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:24:13,343:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:24:13,356:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:24:13,357:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-01 00:24:13,358:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\inne.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-01 00:24:13,363:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:40 UTC.
2024-07-01 00:24:13,363:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:24:13,363:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:24:13,368:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05029710>
Prep: True
2024-07-01 00:24:13,369:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05029710> and installer None
2024-07-01 00:24:13,369:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:24:13,374:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:24:13,375:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:24:13,377:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:24:13,812:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:24:13,813:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:11 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert",
  "skH-afZM_Uk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417"
}
2024-07-01 00:24:13,814:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:24:18,594:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8085_key-certbot.pem
2024-07-01 00:24:23,029:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8083_csr-certbot.pem
2024-07-01 00:24:23,030:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:24:23,030:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:24:23,175:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:24:23,176:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:20 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLCD7grfThgdAuW1j61k7ept7cWP3SLA0Gemd9ys1_TkCk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:24:23,176:DEBUG:acme.client:Storing nonce: B-hK_YLCD7grfThgdAuW1j61k7ept7cWP3SLA0Gemd9ys1_TkCk
2024-07-01 00:24:23,177:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "inne.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:24:23,183:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENEN2dyZlRoZ2RBdVcxajYxazdlcHQ3Y1dQM1NMQTBHZW1kOXlzMV9Ua0NrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "aMYQ9CTmtAxnqATMGlILyePdounTHucZJnqFlQOejnGWmb8cPzooTNm9_Rrb-ESSqvH9CCN-_R5tvVS6fVQZ8yj-OzVapx6z5Td4_Cyx8Q8pV5BK54WrSQ10KKAngRhSxVuXFMLgD1F1Os1HXd1_CAl9joT22tgqQXpGHf1eQHK-QTJ1_ZqM0q8ru5Y75cq3I2vSMTu-QBY4UGJS-x_pf2oKM7Imp8jxLsrnyD89oz8EsIZtUeI6tlqEMulazq5G9RqWuH_m4B77Es8fJdQLsp4Thpd1xWA3UbB4QRk1X2X4yg1HqJKGMQ61EISXwMwuigWb_2OeFnqmE6O8PXpS_g",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogImlubmUuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-01 00:24:23,339:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 346
2024-07-01 00:24:23,340:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:24:20 GMT
Content-Type: application/json
Content-Length: 346
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824371297
Replay-Nonce: eF-2qMJ9qWyHdDjQoJ_tdb6a8gwJ1rkKUiVBy6a9fIeVl8ggeHY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:01:52Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "inne.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824371297"
}
2024-07-01 00:24:23,340:DEBUG:acme.client:Storing nonce: eF-2qMJ9qWyHdDjQoJ_tdb6a8gwJ1rkKUiVBy6a9fIeVl8ggeHY
2024-07-01 00:24:23,340:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:24:23,347:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985803767:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlxV3lIZERqUW9KX3RkYjZhOGd3SjFya0tVaVZCeTZhOWZJZVZsOGdnZUhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4MDM3NjcifQ",
  "signature": "Ix3Yn_i2Q7exTiLP9jbb-n0xLezntv3-qzbHjOWo7jAOhzn3EantCobKOFTJiieAA8AiuVP6tZ6luQut1Z7PdCiEJYgmu-UlvJ0BgWPLTGi6Vg5JyRy84eRFlG33D65AfETnmqJSIVOy3MhfvmmLbqhh7rg24oFozw92VyCFZetSIb_G_QVeq8eneVC-wZflge8LMJLdjxZ5pMOZ9hNBf3SVBL8xZOEwA39Lvrz0ftxv0KYeIUcgduldY_GTy1l6su0AoYsNxeqloTfvlIBnBw75q3V3um9z2-lQ3AwXT_vT2VYaUuLOG97nZ_P9JE-ezr2k_KHSiugR3pA7uXHDUw",
  "payload": ""
}
2024-07-01 00:24:23,497:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985803767 HTTP/1.1" 200 806
2024-07-01 00:24:23,498:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:21 GMT
Content-Type: application/json
Content-Length: 806
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: B-hK_YLCghkPwLxpQycLx8n0ThhMOV9vF0ztJhklAWRRbZMfTfw
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "inne.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:01:52Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/DP175w",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/kAzjPg",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985803767/-Uec4A",
      "status": "pending",
      "token": "xDMNeQNHwcpdW3wCI-9wBBuE4GOQr1_7ybBikIpe1A0"
    }
  ]
}
2024-07-01 00:24:23,498:DEBUG:acme.client:Storing nonce: B-hK_YLCghkPwLxpQycLx8n0ThhMOV9vF0ztJhklAWRRbZMfTfw
2024-07-01 00:24:23,498:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:24:23,499:INFO:certbot._internal.auth_handler:http-01 challenge for inne.daisuke-design.pl
2024-07-01 00:24:23,499:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:24:23,500:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:24:23,500:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:23,501:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:24:23,501:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:24:23,501:WARNING:certbot._internal.renewal:Attempting to renew cert (inne.daisuke-design.pl) from C:\Certbot\renewal\inne.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:24:23,503:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:23,558:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2023-07-02 08:21:13 UTC.
2024-07-01 00:24:23,558:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:24:23,558:DEBUG:certbot._internal.plugins.selection:Requested authenticator manual and installer None
2024-07-01 00:24:23,568:DEBUG:certbot._internal.plugins.disco:Other error:(PluginEntryPoint#manual): An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\disco.py", line 136, in prepare
    self._initialized.prepare()
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\manual.py", line 95, in prepare
    self.option_name('auth-hook')))
certbot.errors.PluginError: An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.
2024-07-01 00:24:23,570:DEBUG:certbot._internal.plugins.selection:No candidate plugin
2024-07-01 00:24:23,570:DEBUG:certbot._internal.plugins.selection:Selected authenticator None and installer None
2024-07-01 00:24:23,570:INFO:certbot._internal.main:Could not choose appropriate plugin: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')
2024-07-01 00:24:23,571:WARNING:certbot._internal.renewal:Attempting to renew cert (merkat.pl) from C:\Certbot\renewal\merkat.pl.conf produced an unexpected error: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.'). Skipping.
2024-07-01 00:24:23,572:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1172, in renew_cert
    installer, auth = plug_sel.choose_configurator_plugins(config, plugins, "certonly")
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 233, in choose_configurator_plugins
    diagnose_configurator_problem("authenticator", req_auth, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\selection.py", line 337, in diagnose_configurator_problem
    raise errors.PluginSelectionError(msg)
certbot.errors.PluginSelectionError: The manual plugin is not working; there may be problems with your existing configuration.
The error was: PluginError('An authentication script must be provided with --manual-auth-hook when using the manual plugin non-interactively.')

2024-07-01 00:24:23,622:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:24:23,738:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:24:23,739:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-01 00:24:23,740:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\numeracja.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-01 00:24:23,746:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:48:58 UTC.
2024-07-01 00:24:23,746:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:24:23,747:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:24:23,755:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05029610>
Prep: True
2024-07-01 00:24:23,755:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05029610> and installer None
2024-07-01 00:24:23,755:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:24:23,760:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:24:23,761:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:24:23,763:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:24:24,200:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:24:24,201:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:21 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "1j3ncvtMoto": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:24:24,202:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:24:29,307:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8086_key-certbot.pem
2024-07-01 00:24:33,771:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8084_csr-certbot.pem
2024-07-01 00:24:33,772:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:24:33,772:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:24:33,918:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:24:33,918:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:31 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9lua5iY9cOG5X5ygQ0yOB_XsHzgrSevFX4mJnZI864BE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:24:33,918:DEBUG:acme.client:Storing nonce: eF-2qMJ9lua5iY9cOG5X5ygQ0yOB_XsHzgrSevFX4mJnZI864BE
2024-07-01 00:24:33,918:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "numeracja.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:24:33,925:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlsdWE1aVk5Y09HNVg1eWdRMHlPQl9Yc0h6Z3JTZXZGWDRtSm5aSTg2NEJFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "WZGhIE8aS1JlcGQWPMRsw3KmoteaK8885t6VhiPNJv8W-e0CCWWHJrh3uQKaOoeKjCQSViCXOkCgLCkiAvlD8289UAFyZP9tnnOi1EYC4t6Tr5Wdq3wu5eHDXMWPtGypEhKe7a71erIeLIVB2B2mqkH9fJKkjEHxR-md1Om-cNXIf7-3ZnPkAYWUulmJQtOAvTtKUvLJzRZ2Xl5UhwkeuvCEtwJ6mP9mqcqFUp0Y7qbzZ15cZ1WRiGQLYbjnoF1iK5FZFlFQJoDv-P59jEtISii9bfz6ah_6VmI49sbI33NigtqqllV1GzvbRWPRIIz6ZfVN9ei7DpLIrVQsX3YwQg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogIm51bWVyYWNqYS5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-01 00:24:34,081:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 351
2024-07-01 00:24:34,082:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:24:31 GMT
Content-Type: application/json
Content-Length: 351
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824405187
Replay-Nonce: B-hK_YLCi0LBCIlXXTy-uDIPnMIqdiiCFh8MwNq8twV1Dxu60ZE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:01Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "numeracja.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824405187"
}
2024-07-01 00:24:34,082:DEBUG:acme.client:Storing nonce: B-hK_YLCi0LBCIlXXTy-uDIPnMIqdiiCFh8MwNq8twV1Dxu60ZE
2024-07-01 00:24:34,082:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:24:34,091:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985856047:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiQi1oS19ZTENpMExCQ0lsWFhUeS11RElQbk1JcWRpaUNGaDhNd05xOHR3VjFEeHU2MFpFIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU4NTYwNDcifQ",
  "signature": "o_gNOxLaubJ7d8Ad9dh7uHLg5kS4lTE7n-39dm7YC9ZloBP7I_w9wvE-SQvr7gD-TsXVw_Aw5ANieEY0E98fT_LWml1unq376P61VfNDDDccJwpcnC-0zGnAWq2ujxV1pNbcjPn6Y-ZHa1Ucavl5gcDSGHb7wsDEDeRAG-jm-2T6nU2-hT-HbVa64Sqru7zTbZ9Rdk6G9U_0wqOVbybZ-WC5-CpOSyY7xqqeZx4X8HUDPJ5qojq6moxfveETyJyYSsIsZ_KXel3bojkQ55qPgOTmEH3CCnR7gi-ymhIrmPEnff9i6scEpOVA-eSJesMUTLoOjmXI2CMdprHyfibDjA",
  "payload": ""
}
2024-07-01 00:24:34,239:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985856047 HTTP/1.1" 200 811
2024-07-01 00:24:34,239:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:31 GMT
Content-Type: application/json
Content-Length: 811
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9_BHaRjifUomTryMY4VNyi2Vuv7m3Zwb0Y9YuH4uYBxs
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "numeracja.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:01Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/ZygfgQ",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/f5kJqg",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985856047/OgjqNA",
      "status": "pending",
      "token": "RqfMdJ_xG0S-KZEcaZyQOUUK4v_OAXEIFyqFkaMKb0s"
    }
  ]
}
2024-07-01 00:24:34,239:DEBUG:acme.client:Storing nonce: eF-2qMJ9_BHaRjifUomTryMY4VNyi2Vuv7m3Zwb0Y9YuH4uYBxs
2024-07-01 00:24:34,240:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:24:34,240:INFO:certbot._internal.auth_handler:http-01 challenge for numeracja.daisuke-design.pl
2024-07-01 00:24:34,241:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:24:34,241:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:24:34,242:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:34,242:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:24:34,242:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:24:34,243:WARNING:certbot._internal.renewal:Attempting to renew cert (numeracja.daisuke-design.pl) from C:\Certbot\renewal\numeracja.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:24:34,244:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:34,297:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:24:34,333:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:24:34,334:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-01 00:24:34,335:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\settings.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-01 00:24:34,339:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:15 UTC.
2024-07-01 00:24:34,340:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:24:34,340:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:24:34,345:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0503DFD0>
Prep: True
2024-07-01 00:24:34,345:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0503DFD0> and installer None
2024-07-01 00:24:34,345:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:24:34,350:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:24:34,351:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:24:34,353:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:24:34,821:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:24:34,821:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:32 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "aUDrFJPFFYI": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:24:34,822:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:24:40,270:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8087_key-certbot.pem
2024-07-01 00:24:44,779:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8085_csr-certbot.pem
2024-07-01 00:24:44,780:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:24:44,781:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:24:44,937:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:24:44,937:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:42 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0MieWfrFU0KJ6zfqJnciDYrpq4Gc46sp4XGwl24BrnUQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:24:44,938:DEBUG:acme.client:Storing nonce: jqVAJFJ0MieWfrFU0KJ6zfqJnciDYrpq4Gc46sp4XGwl24BrnUQ
2024-07-01 00:24:44,938:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "settings.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:24:44,944:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBNaWVXZnJGVTBLSjZ6ZnFKbmNpRFlycHE0R2M0NnNwNFhHd2wyNEJyblVRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "CALGBKFzrxOrb4OuLjSHmosUN9V3VPd7n4wVLmGb0Lw2p05nN_clgIa3uUVXWO6xmxLkpSg-42skYI8xfh7zcsHZIT-CTGosUZZQt9WjxJ_A6u7RJl3tGLlF8xjIxax7fET8kwW5MhA39-fFlAauDmFjNDquYNMfH8ncEIdBYIQykH9u5HPxBeZvcRCjibF_w6meQhEKpXBvq_dBeY8y5A47me3HA_PDzlxvGU5Mjk2psaw3uzH8FoOMvLRDEb6EtADTqNDVdnYkaORYXpBFYAy66uZh6lgdZj4AL9MZWYIE6EAeO3tytWF65vshqPXBCBqLoSYBM5sx3SRbskR1QQ",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInNldHRpbmdzLmRhaXN1a2UtZGVzaWduLnBsIgogICAgfQogIF0KfQ"
}
2024-07-01 00:24:45,116:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 350
2024-07-01 00:24:45,117:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:24:42 GMT
Content-Type: application/json
Content-Length: 350
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824456717
Replay-Nonce: qqMiT6CkUTzA4ZzN5BLkBKNlxEBlZHnH9BOheFbqLrrZp3FMOmY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:12Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "settings.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824456717"
}
2024-07-01 00:24:45,117:DEBUG:acme.client:Storing nonce: qqMiT6CkUTzA4ZzN5BLkBKNlxEBlZHnH9BOheFbqLrrZp3FMOmY
2024-07-01 00:24:45,118:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:24:45,124:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985929937:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tVVHpBNFp6TjVCTGtCS05seEVCbFpIbkg5Qk9oZUZicUxyclpwM0ZNT21ZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5Mjk5MzcifQ",
  "signature": "VLZi7H78VAR_TS4aGI1p8NRFGK8ZzdQZwVj33gAsJP596f5FNzGWQ_62_5FVqo65WTay5UElE2jAG77D44U2soMsvjWEpV-3Kp5g4f3wWKiek2RVQLfpiMlWmlKCYljzHco9Cd1ytrAOo2IHO2ehvjXYrDDiLyMBrwn5HN0Bsq7xKY6eMXP2ftE0toZhqwQT3jeifM5PEdqML2-gzrwegX341ZaijjYmQpg5kdLrITrGR42GobaGKfRib29IrFFVY0BcvYECrv9qbp4aJd3UshoojZFr4AOXns3qG33_gcaOvDmsdnxT5MwUN1tUOxQ3z2ZUR_UlIymYkDGd4IJVtg",
  "payload": ""
}
2024-07-01 00:24:45,286:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985929937 HTTP/1.1" 200 810
2024-07-01 00:24:45,287:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:42 GMT
Content-Type: application/json
Content-Length: 810
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6CkgiEuA-LG2gVAjXal_NirJFhU3CS6z8_8cN9wfGIF2oE
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "settings.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:12Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/gXwyeA",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/K4XtOg",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985929937/NX0yhA",
      "status": "pending",
      "token": "8dtdLRSWcH99KELs9Vw1e3G7GMuPp1UN1Eenjg5NjiY"
    }
  ]
}
2024-07-01 00:24:45,287:DEBUG:acme.client:Storing nonce: qqMiT6CkgiEuA-LG2gVAjXal_NirJFhU3CS6z8_8cN9wfGIF2oE
2024-07-01 00:24:45,288:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:24:45,288:INFO:certbot._internal.auth_handler:http-01 challenge for settings.daisuke-design.pl
2024-07-01 00:24:45,288:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:24:45,289:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:24:45,290:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:45,290:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:24:45,290:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:24:45,290:WARNING:certbot._internal.renewal:Attempting to renew cert (settings.daisuke-design.pl) from C:\Certbot\renewal\settings.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:24:45,291:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:45,329:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:24:45,370:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:24:45,371:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is signed by the certificate's issuer.
2024-07-01 00:24:45,372:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\torrent.daisuke-design.pl\cert15.pem is: OCSPCertStatus.GOOD
2024-07-01 00:24:45,377:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:29 UTC.
2024-07-01 00:24:45,377:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:24:45,377:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:24:45,381:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x04D3CBB0>
Prep: True
2024-07-01 00:24:45,381:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x04D3CBB0> and installer None
2024-07-01 00:24:45,381:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:24:45,387:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:24:45,387:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:24:45,390:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:24:45,867:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:24:45,868:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:43 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "b_O7XDQ5TOk": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:24:45,868:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:24:50,728:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8088_key-certbot.pem
2024-07-01 00:24:55,183:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8086_csr-certbot.pem
2024-07-01 00:24:55,183:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:24:55,183:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:24:55,344:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:24:55,345:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:52 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6Ckl2QtgMiOytVfKONe382g22On_l2Pw74qtS9PO1Pql8Y
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:24:55,345:DEBUG:acme.client:Storing nonce: qqMiT6Ckl2QtgMiOytVfKONe382g22On_l2Pw74qtS9PO1Pql8Y
2024-07-01 00:24:55,345:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "torrent.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:24:55,352:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tsMlF0Z01pT3l0VmZLT05lMzgyZzIyT25fbDJQdzc0cXRTOVBPMVBxbDhZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "uDE8PDasaMVIAjukwMHzOyJRuwv7UkP1YStfEg8VgxV1ige5dxvbO0cCAUFV8Qt9VK7Cu5qjXLQRmkS8IFSOpqdx3T8pS23wZ2hPpbkqXjOn2qn5Wn3RUL2s0TYvRv2T29knFX9kWTVu9DvTx1pbZkxi40mv_JuTZH-Wgh4RA5wnvf7965WkPBqDC0aCNpU76B9m9XuMLPTYdTSaTb4h22DrN7Z1QPAIZPLz3Pj7bccatE7gMxATaZQq_RV-QQiTeU_Ozwnaf24DjmQ8ti-1xO_9925rjidalWbzzsEQQAVqXfmjRR2vhdklsgikfHN0NHPe12HDyFLcLzp9mxNXUA",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInRvcnJlbnQuZGFpc3VrZS1kZXNpZ24ucGwiCiAgICB9CiAgXQp9"
}
2024-07-01 00:24:55,524:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 349
2024-07-01 00:24:55,525:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:24:53 GMT
Content-Type: application/json
Content-Length: 349
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824496987
Replay-Nonce: jqVAJFJ0f447VvgpjSgmGqwFRFyNs_TVNYISzHQ5uau1ulux4QQ
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:22Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "torrent.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824496987"
}
2024-07-01 00:24:55,525:DEBUG:acme.client:Storing nonce: jqVAJFJ0f447VvgpjSgmGqwFRFyNs_TVNYISzHQ5uau1ulux4QQ
2024-07-01 00:24:55,525:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:24:55,531:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368985989517:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBmNDQ3VnZncGpTZ21HcXdGUkZ5TnNfVFZOWUlTekhRNXVhdTF1bHV4NFFRIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODU5ODk1MTcifQ",
  "signature": "DiTgzkepfAXublLSbH9oHphkiGGPZRUrk_CfHToFchApYY3JJJH4aSQJWmnvP5qV3YOdvel14yOWSdCXsZ27FDxvbgRhyo8QApDdaAte_3wLldAJhYFu6XfgU9LQg7TxFPhWm1XCrZ1edHe2QKoU6X3CMnfGaPZds_tOPhpjPhERiLpHHEoQ-l_mMnG5gz5iHiwomeXcEJWRibJRCqx-7OStQlx0qH25MOBR6TUX0MvhKC1z18_1oqgvXBSh4YrteuEkuyGVIEildieW3-PyPxx8rYdBbcBHU7A4kH7TTxKGalbrgyUiwX3ldzGQuYNrrlbzpqWS2EWEblLEP3MaYQ",
  "payload": ""
}
2024-07-01 00:24:55,696:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368985989517 HTTP/1.1" 200 809
2024-07-01 00:24:55,696:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:53 GMT
Content-Type: application/json
Content-Length: 809
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: jqVAJFJ0rNJbC5NzL3Z-WPFrS9SPjJeUybzc73LHyIeoyXtfHmk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "torrent.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:22Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/ebl14A",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/-PFYBw",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368985989517/LKEO7w",
      "status": "pending",
      "token": "UfE8cL9ocmy90ZyrDDqTMHeIUZ1kKwiUcUV594vEAL0"
    }
  ]
}
2024-07-01 00:24:55,697:DEBUG:acme.client:Storing nonce: jqVAJFJ0rNJbC5NzL3Z-WPFrS9SPjJeUybzc73LHyIeoyXtfHmk
2024-07-01 00:24:55,697:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:24:55,698:INFO:certbot._internal.auth_handler:http-01 challenge for torrent.daisuke-design.pl
2024-07-01 00:24:55,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:24:55,698:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:24:55,699:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:55,699:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:24:55,700:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:24:55,700:WARNING:certbot._internal.renewal:Attempting to renew cert (torrent.daisuke-design.pl) from C:\Certbot\renewal\torrent.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:24:55,701:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:24:55,753:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:24:55,775:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:24:55,776:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is signed by the certificate's issuer.
2024-07-01 00:24:55,777:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\tts.daisuke-design.pl\cert13.pem is: OCSPCertStatus.GOOD
2024-07-01 00:24:55,782:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:49:53 UTC.
2024-07-01 00:24:55,782:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:24:55,782:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:24:55,787:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x01005CB0>
Prep: True
2024-07-01 00:24:55,788:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x01005CB0> and installer None
2024-07-01 00:24:55,788:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:24:55,793:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:24:55,794:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:24:55,796:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:24:56,242:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:24:56,243:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:24:53 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "OVsRZatcXGY": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:24:56,243:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:25:01,133:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8089_key-certbot.pem
2024-07-01 00:25:05,681:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8087_csr-certbot.pem
2024-07-01 00:25:05,682:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:25:05,682:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:25:05,831:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:25:05,832:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:03 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9rkqK8UmCobmoUXXXzkcBt_pv7K1yZD8cMXXMTpdRXHk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:25:05,832:DEBUG:acme.client:Storing nonce: eF-2qMJ9rkqK8UmCobmoUXXXzkcBt_pv7K1yZD8cMXXMTpdRXHk
2024-07-01 00:25:05,833:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "tts.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:25:05,839:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjlya3FLOFVtQ29ibW9VWFhYemtjQnRfcHY3SzF5WkQ4Y01YWE1UcGRSWEhrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "jk_f_OpKta68oEiTS3ppZExsHn7yBRl7rHUyud0bUUKOy85ylpcnspRmquJPSbnmPJQZOcME6KspzLSglQLzjOgM1CHmSnOv5mvTA56X3e3nEyoZUE1NXuKAnBFJcp3p_WF12dIV8Bj-3k8TAmQpkifgY9w3LoihMZTNfCzCJrKQDhsNhPn_RlCNh8PmVcNHEkYdc88sNai0Qy8Rtdk6WxMlgn_IuLKLRlqINxLTzodapKvOcWh26IYC3Xc7Tt1ooEgislIWyxp4ic2dBkeOBvXy7lLHaebzbVPwM9IjbT7P8CKmRX1kAAOTacNUGgNlpTskOH-LvHv7iyp70qGtig",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInR0cy5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-01 00:25:06,069:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-01 00:25:06,070:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:25:03 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824533727
Replay-Nonce: eF-2qMJ9zQDXc0OZyLOxLIWRG-uRE7ywf5babiTc6WIrwOcCDS8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:32Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "tts.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824533727"
}
2024-07-01 00:25:06,070:DEBUG:acme.client:Storing nonce: eF-2qMJ9zQDXc0OZyLOxLIWRG-uRE7ywf5babiTc6WIrwOcCDS8
2024-07-01 00:25:06,070:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:25:06,076:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986047927:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAiZUYtMnFNSjl6UURYYzBPWnlMT3hMSVdSRy11UkU3eXdmNWJhYmlUYzZXSXJ3T2NDRFM4IiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYwNDc5MjcifQ",
  "signature": "jW2qrI3NLXTY4RukW3HVDC2_bSp9BE-G8zQcmBsVVcK-0Q7qolFeQw75Wmq7SKi8sxebrKQz4eIBPqi7KAv1txc4NR8SzqZ9uCDdCEuSm_9KywK1uVUkttAQyxEHWuwFLrNx4iuPrznpHkS9q7TSWZ74-EyfNJrl2m63r1CqB5L2lGO03X9B_koguDOhjOKwywBZNyO4l87Ak8PNy91imrUrUol67Iq_3y0M51WfLlNRg-TulYtUfilzMkSj99pNsR0nso-rWzwynzV6mPXsRRK-gPZYbrhW5mBXKvwdHkU_cGCcZIQx4317puOPpGu-oAqLOOn80CWSXrxmseASaA",
  "payload": ""
}
2024-07-01 00:25:06,235:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986047927 HTTP/1.1" 200 805
2024-07-01 00:25:06,235:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:03 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: eF-2qMJ9ET9J3F6K2_zIJf5n6M-a07IjmXylJJGMVQRnf2OAVe8
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "tts.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:32Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/a7aI1Q",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/Rqj-2Q",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986047927/4mVq6w",
      "status": "pending",
      "token": "mDf04r30KuFzSpCphgOGAnVMHkMpofCg-th1AlWAfy0"
    }
  ]
}
2024-07-01 00:25:06,236:DEBUG:acme.client:Storing nonce: eF-2qMJ9ET9J3F6K2_zIJf5n6M-a07IjmXylJJGMVQRnf2OAVe8
2024-07-01 00:25:06,236:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:25:06,237:INFO:certbot._internal.auth_handler:http-01 challenge for tts.daisuke-design.pl
2024-07-01 00:25:06,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:25:06,237:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:25:06,238:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:25:06,238:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:25:06,239:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:25:06,239:WARNING:certbot._internal.renewal:Attempting to renew cert (tts.daisuke-design.pl) from C:\Certbot\renewal\tts.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:25:06,240:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:25:06,289:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:25:06,336:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:25:06,338:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is signed by the certificate's issuer.
2024-07-01 00:25:06,339:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\vod.daisuke-design.pl\cert18.pem is: OCSPCertStatus.GOOD
2024-07-01 00:25:06,344:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:19 UTC.
2024-07-01 00:25:06,344:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:25:06,344:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:25:06,350:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x0503DE10>
Prep: True
2024-07-01 00:25:06,351:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x0503DE10> and installer None
2024-07-01 00:25:06,351:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:25:06,357:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:25:06,358:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:25:06,361:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:25:06,840:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:25:06,841:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:04 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "7_RV0lkMwgM": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:25:06,841:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:25:11,595:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8090_key-certbot.pem
2024-07-01 00:25:16,049:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8088_csr-certbot.pem
2024-07-01 00:25:16,050:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:25:16,050:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:25:16,215:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:25:16,215:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:13 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6Ck0iHsVX4N1O1tKY0zqVfVeIrkUym_TXbH4fz-zMQqc8g
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:25:16,215:DEBUG:acme.client:Storing nonce: qqMiT6Ck0iHsVX4N1O1tKY0zqVfVeIrkUym_TXbH4fz-zMQqc8g
2024-07-01 00:25:16,216:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "vod.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:25:16,223:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2swaUhzVlg0TjFPMXRLWTB6cVZmVmVJcmtVeW1fVFhiSDRmei16TVFxYzhnIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "smCaCh-gj8WZVhfYiUT5jJi_ZGUfZF2I14xPH5oq0ok-E86JFFvIfqwdwlz0EPjgX0vOkiFCCAaUluPXLql-QIEVyG1JrhrCebcy-OFjc6DM1Lgm-v-Z7NNaNE62ejbdmiAzN_fZkdeugJtB6XRPcDDHeDBVKltHkGromOVm6cTy1zn65Ditaj0Th9SdYGjMctSSvgIr9eBfp0HvIA3NGyWJRYqwGbp-j0wipirHMxLFU4Wb6VGxLQ0c33cLWhgLyWbOus9Caq2opc7CU0OlLNQRepzstb_nZBg4XBkI9i0iLMenKKgthDgdkxGAOLvamx3Msln93kkuQ11JIAJVqw",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInZvZC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-01 00:25:16,395:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-01 00:25:16,395:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:25:13 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824568847
Replay-Nonce: jqVAJFJ0llWxu1zBhKg74xhbDjgQCWD1xMl-NVEu3tPnklNDDlU
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:42Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "vod.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824568847"
}
2024-07-01 00:25:16,396:DEBUG:acme.client:Storing nonce: jqVAJFJ0llWxu1zBhKg74xhbDjgQCWD1xMl-NVEu3tPnklNDDlU
2024-07-01 00:25:16,396:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:25:16,401:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986101167:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAianFWQUpGSjBsbFd4dTF6QmhLZzc0eGhiRGpnUUNXRDF4TWwtTlZFdTN0UG5rbE5ERGxVIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxMDExNjcifQ",
  "signature": "XrtADPnmzNz_L1K_K-ZUKtA5lFUax1v4ZTlcC7xwUxnLEU-HFMyYA-WG6YYSGnqcndkDCDPVod3PN_2ukd4_CpwJ8ZJHFLjteYqkQIhGl_wAGXO9jHs5gm4Rd0_NM7QwAo8jkFyfaozkRGUMYmtTnwf5tKYSSthCBK8FAjvd8z1CpS-_ZDnjATedzqTZgGsEotcxsbE44Rd_MJrprfhT18OREcKjOUtSyvvRAYcAr-9VL5yVRWxJlNHKJRmyc1GkZ03uz3H5Rw5nBS65wQAAVf7MS9wsflitOjwTMz3jh2OyhiIQcDJzgwW2GUneVR5gY6t7oTzBzrEsPgwbBGd6hw",
  "payload": ""
}
2024-07-01 00:25:16,566:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986101167 HTTP/1.1" 200 805
2024-07-01 00:25:16,567:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:14 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6CkB3NHDlrOluWQIuMyIvxr9_roxB8MCVtMLKZsqcWry4Q
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "vod.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:42Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/nlLFxg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/mOuqMg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986101167/b0ZrJg",
      "status": "pending",
      "token": "lMUEHUi1DeK92T4Ogolb39uj-knyz5OJFcwZSF-WE6Q"
    }
  ]
}
2024-07-01 00:25:16,567:DEBUG:acme.client:Storing nonce: qqMiT6CkB3NHDlrOluWQIuMyIvxr9_roxB8MCVtMLKZsqcWry4Q
2024-07-01 00:25:16,568:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:25:16,568:INFO:certbot._internal.auth_handler:http-01 challenge for vod.daisuke-design.pl
2024-07-01 00:25:16,569:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:25:16,569:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:25:16,570:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:25:16,570:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:25:16,570:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:25:16,570:WARNING:certbot._internal.renewal:Attempting to renew cert (vod.daisuke-design.pl) from C:\Certbot\renewal\vod.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:25:16,572:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:25:16,625:DEBUG:urllib3.connectionpool:Starting new HTTP connection (1): r3.o.lencr.org:80
2024-07-01 00:25:16,646:DEBUG:urllib3.connectionpool:http://r3.o.lencr.org:80 "POST / HTTP/1.1" 200 503
2024-07-01 00:25:16,647:DEBUG:certbot.ocsp:OCSP response for certificate C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is signed by the certificate's issuer.
2024-07-01 00:25:16,648:DEBUG:certbot.ocsp:OCSP certificate status for C:\Certbot\archive\xxx.daisuke-design.pl\cert16.pem is: OCSPCertStatus.GOOD
2024-07-01 00:25:16,662:DEBUG:certbot._internal.storage:Should renew, less than 30 days before certificate expiry 2024-07-25 18:50:37 UTC.
2024-07-01 00:25:16,662:INFO:certbot._internal.renewal:Cert is due for renewal, auto-renewing...
2024-07-01 00:25:16,662:DEBUG:certbot._internal.plugins.selection:Requested authenticator standalone and installer None
2024-07-01 00:25:16,667:DEBUG:certbot._internal.plugins.selection:Single candidate plugin: * standalone
Description: Spin up a temporary webserver
Interfaces: IAuthenticator, IPlugin
Entry point: standalone = certbot._internal.plugins.standalone:Authenticator
Initialized: <certbot._internal.plugins.standalone.Authenticator object at 0x05029A30>
Prep: True
2024-07-01 00:25:16,668:DEBUG:certbot._internal.plugins.selection:Selected authenticator <certbot._internal.plugins.standalone.Authenticator object at 0x05029A30> and installer None
2024-07-01 00:25:16,668:INFO:certbot._internal.plugins.selection:Plugins selected: Authenticator standalone, Installer None
2024-07-01 00:25:16,673:DEBUG:certbot._internal.main:Picked account: <Account(RegistrationResource(body=Registration(key=None, contact=(), agreement=None, status=None, terms_of_service_agreed=None, only_return_existing=None, external_account_binding=None), uri='https://acme-v02.api.letsencrypt.org/acme/acct/92790611', new_authzr_uri=None, terms_of_service=None), 3137118528c44988be4df6a04f4d2d58, Meta(creation_dt=datetime.datetime(2020, 7, 31, 16, 19, 6, tzinfo=<UTC>), creation_host='SERWER', register_to_eff=None))>
2024-07-01 00:25:16,674:DEBUG:acme.client:Sending GET request to https://acme-v02.api.letsencrypt.org/directory.
2024-07-01 00:25:16,676:DEBUG:urllib3.connectionpool:Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org:443
2024-07-01 00:25:17,153:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "GET /directory HTTP/1.1" 200 746
2024-07-01 00:25:17,154:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:14 GMT
Content-Type: application/json
Content-Length: 746
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "gUFa8YjHBm0": "https://community.letsencrypt.org/t/adding-random-entries-to-the-directory/33417",
  "keyChange": "https://acme-v02.api.letsencrypt.org/acme/key-change",
  "meta": {
    "caaIdentities": [
      "letsencrypt.org"
    ],
    "termsOfService": "https://letsencrypt.org/documents/LE-SA-v1.4-April-3-2024.pdf",
    "website": "https://letsencrypt.org"
  },
  "newAccount": "https://acme-v02.api.letsencrypt.org/acme/new-acct",
  "newNonce": "https://acme-v02.api.letsencrypt.org/acme/new-nonce",
  "newOrder": "https://acme-v02.api.letsencrypt.org/acme/new-order",
  "renewalInfo": "https://acme-v02.api.letsencrypt.org/draft-ietf-acme-ari-03/renewalInfo",
  "revokeCert": "https://acme-v02.api.letsencrypt.org/acme/revoke-cert"
}
2024-07-01 00:25:17,155:INFO:certbot._internal.main:Renewing an existing certificate
2024-07-01 00:25:21,781:DEBUG:certbot.crypto_util:Generating key (2048 bits): C:\Certbot\keys\8091_key-certbot.pem
2024-07-01 00:25:26,232:DEBUG:certbot.crypto_util:Creating CSR: C:\Certbot\csr\8089_csr-certbot.pem
2024-07-01 00:25:26,232:DEBUG:acme.client:Requesting fresh nonce
2024-07-01 00:25:26,232:DEBUG:acme.client:Sending HEAD request to https://acme-v02.api.letsencrypt.org/acme/new-nonce.
2024-07-01 00:25:26,393:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "HEAD /acme/new-nonce HTTP/1.1" 200 0
2024-07-01 00:25:26,393:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:23 GMT
Connection: keep-alive
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6Ckwao_-oGXLs3XZ1626rfpq0hI1ipTLH9Dzgjy6a4q9Sk
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800


2024-07-01 00:25:26,393:DEBUG:acme.client:Storing nonce: qqMiT6Ckwao_-oGXLs3XZ1626rfpq0hI1ipTLH9Dzgjy6a4q9Sk
2024-07-01 00:25:26,393:DEBUG:acme.client:JWS payload:
b'{\n  "identifiers": [\n    {\n      "type": "dns",\n      "value": "xxx.daisuke-design.pl"\n    }\n  ]\n}'
2024-07-01 00:25:26,399:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/new-order:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2t3YW9fLW9HWExzM1haMTYyNnJmcHEwaEkxaXBUTEg5RHpnank2YTRxOVNrIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9uZXctb3JkZXIifQ",
  "signature": "kiqTOKn7Wy9egFtV4iZNsDb6zw61YcD22FwpKl5iswzSW_Praq79ApsPIudiRsWEUgUEpxuUa-c5nQcewPcBHgoq9mWPipRK6_2sshSrSkCKlrMFaBJ_XMYsNHNL7eoTOzUAibabPfooT8ZyiE2ovIYd_7M9XIjXH-5EZSNUemBv8UbhplR-iP-H9pQQmfDs1dyvOcKEYToYHfAaduPq1aP_lex7s-G7aw547SxslNaINeP7ptcCtKPhshLObwSnxbzUrBgDAn7SGPBXOuF8Os8_4c0dUgoQuhNCVUJR_uFRpHTiRSVSIlqAOazsh3x8Owgr-Vw2rZzswpCYdF-hDg",
  "payload": "ewogICJpZGVudGlmaWVycyI6IFsKICAgIHsKICAgICAgInR5cGUiOiAiZG5zIiwKICAgICAgInZhbHVlIjogInh4eC5kYWlzdWtlLWRlc2lnbi5wbCIKICAgIH0KICBdCn0"
}
2024-07-01 00:25:26,576:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/new-order HTTP/1.1" 201 345
2024-07-01 00:25:26,576:DEBUG:acme.client:Received response:
HTTP 201
Server: nginx
Date: Sun, 30 Jun 2024 22:25:24 GMT
Content-Type: application/json
Content-Length: 345
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Location: https://acme-v02.api.letsencrypt.org/acme/order/92790611/281824603047
Replay-Nonce: qqMiT6CkBmfMd5gIPjt1gEcsxG3ZHVtgmJVb4jMQfoYJ-_o2MlY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "status": "pending",
  "expires": "2024-07-03T08:02:53Z",
  "identifiers": [
    {
      "type": "dns",
      "value": "xxx.daisuke-design.pl"
    }
  ],
  "authorizations": [
    "https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647"
  ],
  "finalize": "https://acme-v02.api.letsencrypt.org/acme/finalize/92790611/281824603047"
}
2024-07-01 00:25:26,576:DEBUG:acme.client:Storing nonce: qqMiT6CkBmfMd5gIPjt1gEcsxG3ZHVtgmJVb4jMQfoYJ-_o2MlY
2024-07-01 00:25:26,577:DEBUG:acme.client:JWS payload:
b''
2024-07-01 00:25:26,583:DEBUG:acme.client:Sending POST request to https://acme-v02.api.letsencrypt.org/acme/authz-v3/368986156647:
{
  "protected": "eyJhbGciOiAiUlMyNTYiLCAia2lkIjogImh0dHBzOi8vYWNtZS12MDIuYXBpLmxldHNlbmNyeXB0Lm9yZy9hY21lL2FjY3QvOTI3OTA2MTEiLCAibm9uY2UiOiAicXFNaVQ2Q2tCbWZNZDVnSVBqdDFnRWNzeEczWkhWdGdtSlZiNGpNUWZvWUotX28yTWxZIiwgInVybCI6ICJodHRwczovL2FjbWUtdjAyLmFwaS5sZXRzZW5jcnlwdC5vcmcvYWNtZS9hdXRoei12My8zNjg5ODYxNTY2NDcifQ",
  "signature": "q7wwlSpJ3w8v2FgxqjJ1LacYSS1Xp3l_Dv3BzJTWYnpRKGU7y7grlyOt4T_W6D_I1avaa7kWvokxQSmHPfu1HQBPQHpyjh1SU4sD6W4M1EJIUrUG39gdAhHyATQJ7PIXuvU38Oylv9Xh2P3T3P5GxFVNDPmlSKP9VAFZhpMWVuO-i_bAeRaspIg4VXPnbe-RcBy5eyEVBcvRTfyWGquENydYq4dBf2vJ0sbBw7kBtVqD8I7Wl_Dwz8E0SuFkm72kDlpgeJIFQjbBir28CqtmHQhcxRg2tH7IY6O57MSt2-uPrtsqwpJKISXlaUZXG-giGPXf2Kc15lVMOlvlFyIsfw",
  "payload": ""
}
2024-07-01 00:25:26,749:DEBUG:urllib3.connectionpool:https://acme-v02.api.letsencrypt.org:443 "POST /acme/authz-v3/368986156647 HTTP/1.1" 200 805
2024-07-01 00:25:26,750:DEBUG:acme.client:Received response:
HTTP 200
Server: nginx
Date: Sun, 30 Jun 2024 22:25:24 GMT
Content-Type: application/json
Content-Length: 805
Connection: keep-alive
Boulder-Requester: 92790611
Cache-Control: public, max-age=0, no-cache
Link: <https://acme-v02.api.letsencrypt.org/directory>;rel="index"
Replay-Nonce: qqMiT6Ck6PLx_YAr9DoDAG6DKHUarDTsYFmA0V5oXfUXUDSNPBY
X-Frame-Options: DENY
Strict-Transport-Security: max-age=604800

{
  "identifier": {
    "type": "dns",
    "value": "xxx.daisuke-design.pl"
  },
  "status": "pending",
  "expires": "2024-07-03T08:02:53Z",
  "challenges": [
    {
      "type": "http-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/B3rfNg",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    },
    {
      "type": "dns-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/ZEHm3Q",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    },
    {
      "type": "tls-alpn-01",
      "url": "https://acme-v02.api.letsencrypt.org/acme/chall-v3/368986156647/xivawQ",
      "status": "pending",
      "token": "5p5ZyZ1zeX_LOMptlyWq9Nr_0z_9VAN6o6nP40MxWWk"
    }
  ]
}
2024-07-01 00:25:26,750:DEBUG:acme.client:Storing nonce: qqMiT6Ck6PLx_YAr9DoDAG6DKHUarDTsYFmA0V5oXfUXUDSNPBY
2024-07-01 00:25:26,751:INFO:certbot._internal.auth_handler:Performing the following challenges:
2024-07-01 00:25:26,751:INFO:certbot._internal.auth_handler:http-01 challenge for xxx.daisuke-design.pl
2024-07-01 00:25:26,752:DEBUG:acme.standalone:Failed to bind to :80 using IPv6
2024-07-01 00:25:26,752:DEBUG:acme.standalone:Failed to bind to :80 using IPv4
2024-07-01 00:25:26,753:DEBUG:certbot._internal.error_handler:Encountered exception:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:25:26,753:DEBUG:certbot._internal.error_handler:Calling registered functions
2024-07-01 00:25:26,753:INFO:certbot._internal.auth_handler:Cleaning up challenges
2024-07-01 00:25:26,753:WARNING:certbot._internal.renewal:Attempting to renew cert (xxx.daisuke-design.pl) from C:\Certbot\renewal\xxx.daisuke-design.pl.conf produced an unexpected error: Problem binding to port 80: Could not bind to IPv4 or IPv6.. Skipping.
2024-07-01 00:25:26,755:DEBUG:certbot._internal.renewal:Traceback was:
Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 72, in run
    address, self.http_01_resources)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 190, in __init__
    BaseDualNetworkedServers.__init__(self, HTTP01Server, *args, **kwargs)
  File "C:\Program Files (x86)\Certbot\pkgs\acme\standalone.py", line 105, in __init__
    raise socket.error("Could not bind to IPv4 or IPv6.")
OSError: Could not bind to IPv4 or IPv6.

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 462, in handle_renewal_request
    main.renew_cert(lineage_config, plugins, renewal_candidate)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1178, in renew_cert
    renewed_lineage = _get_and_save_cert(le_client, config, lineage=lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 116, in _get_and_save_cert
    renewal.renew_cert(config, domains, le_client, lineage)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 320, in renew_cert
    new_cert, new_chain, new_key, _ = le_client.obtain_certificate(domains, new_key)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 351, in obtain_certificate
    orderr = self._get_order_and_authorizations(csr.data, self.config.allow_subset_of_names)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\client.py", line 398, in _get_order_and_authorizations
    authzr = self.auth_handler.handle_authorizations(orderr, best_effort)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\auth_handler.py", line 70, in handle_authorizations
    resps = self.auth.perform(achalls)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in perform
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 156, in <listcomp>
    return [self._try_perform_single(achall) for achall in achalls]
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 163, in _try_perform_single
    _handle_perform_error(error)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 210, in _handle_perform_error
    raise error
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 161, in _try_perform_single
    return self._perform_single(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 166, in _perform_single
    servers, response = self._perform_http_01(achall)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 173, in _perform_http_01
    servers = self.servers.run(port, challenges.HTTP01, listenaddr=addr)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\plugins\standalone.py", line 74, in run
    raise errors.StandaloneBindError(error, port)
certbot.errors.StandaloneBindError: Problem binding to port 80: Could not bind to IPv4 or IPv6.

2024-07-01 00:25:26,755:ERROR:certbot._internal.renewal:All renewal attempts failed. The following certs could not be renewed:
2024-07-01 00:25:26,755:ERROR:certbot._internal.renewal:  C:\Certbot\live\ai-image.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\ai.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\aslan.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\fsp.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\galeria.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\inne.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\merkat.pl\fullchain.pem (failure)
  C:\Certbot\live\numeracja.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\settings.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\torrent.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\tts.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\vod.daisuke-design.pl\fullchain.pem (failure)
  C:\Certbot\live\xxx.daisuke-design.pl\fullchain.pem (failure)
2024-07-01 00:25:26,757:DEBUG:certbot._internal.log:Exiting abnormally:
Traceback (most recent call last):
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 193, in _run_module_as_main
  File "D:\obj\windows-release\37win32_Release\msi_python\zip_win32\runpy.py", line 85, in _run_code
  File "C:\Program Files (x86)\Certbot\bin\certbot.exe\__main__.py", line 33, in <module>
    sys.exit(main())
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\main.py", line 15, in main
    return internal_main.main(cli_args)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1353, in main
    return config.func(config, plugins)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\main.py", line 1261, in renew
    renewal.handle_renewal_request(config)
  File "C:\Program Files (x86)\Certbot\pkgs\certbot\_internal\renewal.py", line 487, in handle_renewal_request
    len(renew_failures), len(parse_failures)))
certbot.errors.Error: 14 renew failure(s), 0 parse failure(s)
2024-07-01 00:25:26,759:ERROR:certbot._internal.log:14 renew failure(s), 0 parse failure(s)